Threat Database Trojans Trojan.MSIL.VenomRAT.A

Trojan.MSIL.VenomRAT.A

By CagedTech in Trojans

Analysis Report

General information

Family Name: Trojan.MSIL.VenomRAT.A
Signature status: Hash Mismatch

Known Samples

MD5: 24870c107478925202bfaac11ad73c78
SHA1: e0408e35ef13f3b920be44fbc7874ce7d64dfb99
SHA256: AB5E8D67A2D0479D7806D81D28FDF517FE686CFB068B5890B7DB1294163F132B
File Size: 1.96 MB, 1956864 bytes
MD5: 1151aaba22bbb07ce46d7b4cb6c933b8
SHA1: e43a9a05c14eacffdae029dc32af00b5bdf9118e
SHA256: 6CC063CE0F176B399724B6C258BB6F387A1DC4C3B18C2DAF5F3CDADA1FDC58B0
File Size: 1.73 MB, 1726240 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have security information
  • File is .NET application
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Assembly Version 1.0.0.0
File Description j34ytje
File Version 1.0.0.0
Internal Name
  • etuqwhertou.exe
  • gertqe.exe
Legal Copyright Copyright © 2025
Original Filename
  • etuqwhertou.exe
  • gertqe.exe
Product Name j34ytje
Product Version 1.0.0.0

Digital Signatures

Signer Root Status
IObit Information Technology VeriSign Class 3 Code Signing 2010 CA Hash Mismatch

File Traits

  • .NET
  • HighEntropy
  • Run
  • x86

Block Information

Total Blocks: 15
Potentially Malicious Blocks: 6
Whitelisted Blocks: 9
Unknown Blocks: 0

Visual Map

0 0 0 0 0 x 0 x x x x x 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • MSIL.VenomRAT.A

Registry Modifications

Key::Value Data API Name
HKCU\software\microsoft\windows\currentversion\run::svchost_win32_411 powershell "start c:\users\user\downloads\e0408e35ef13f3b920be44fbc7874ce7d64dfb99_0001956864" -WindowStyle Hidden RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\run::svchost_win32_411 powershell "start c:\users\user\downloads\e43a9a05c14eacffdae029dc32af00b5bdf9118e_0001726240" -WindowStyle Hidden RegNtPreCreateKey

Windows API Usage

Category API
User Data Access
  • GetUserDefaultLocaleName
  • GetUserObjectInformation
Anti Debug
  • NtQuerySystemInformation
Encryption Used
  • BCryptOpenAlgorithmProvider

Trending

Most Viewed

Loading...